TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Bypassing Windows 10's Protections Using a Single Bit

358 pointsby 2510c39011c5over 10 years ago

10 comments

Animatsover 10 years ago
When your OS kernel handles scroll bars, you&#x27;re doing something wrong.<p>NT 3.5 had the GUI entirely outside the kernel. For compatibility with Windows 95, much of the Windows 95 GUI code was moved into the kernel. 20 years later, that decision is still causing bugs.
评论 #9031661 未加载
评论 #9033336 未加载
评论 #9031593 未加载
评论 #9031591 未加载
评论 #9033533 未加载
评论 #9031954 未加载
评论 #9032724 未加载
评论 #9033359 未加载
评论 #9035693 未加载
评论 #9031746 未加载
sandwormover 10 years ago
It&#x27;s a flaw. A bad one. But things like this get patched every day. Only an idiot would believe there aren&#x27;t plenty of other undiscovered security flaws in windows, or any other OS. What matters is whether this flaw was ever exploited, whether it was ever spotted in the wild, before it was patched.<p>I am more than happy to criticize microsoft. I truly hate windows and everything it represents. But the system seems to have worked here. The bug was reported and patched before it became a widespread issue. I&#x27;ll save my venom for those all-to-common days where Microsoft fails to address a problem in a timely manner. (or also Apple, plenty of venom for them too.)
评论 #9032011 未加载
评论 #9032067 未加载
评论 #9032231 未加载
mdrileyover 10 years ago
This doesn&#x27;t &quot;bypass all Windows security measures&quot;. As of Windows 8, processes can disable win32k syscalls using SetProcessMitigationPolicy with ProcessSystemCallDisablePolicy.<p><a href="https://msdn.microsoft.com/en-us/library/windows/desktop/hh769088%28v=vs.85%29.aspx" rel="nofollow">https:&#x2F;&#x2F;msdn.microsoft.com&#x2F;en-us&#x2F;library&#x2F;windows&#x2F;desktop&#x2F;hh7...</a>
评论 #9031997 未加载
laurent123456over 10 years ago
How do they find exploits like this? Do they check every single kernel functions for unchecked pointers? Do they have some automated way to discover this?
评论 #9032514 未加载
peterkellyover 10 years ago
&gt; This particular vulnerability appears in the <i>GUI component of Microsoft Windows Kernel</i><p>There&#x27;s your problem right there.
评论 #9032131 未加载
MichaelGGover 10 years ago
How many of those new protections listed (DEP, ASLR, page 0 mapping) are still useful with a system like Rust? Cause it seems like a hell of a lot of effort is going into hardening the environment cause the code is just that leaky, but I&#x27;m probably misunderstanding something.
评论 #9032212 未加载
评论 #9032357 未加载
评论 #9032398 未加载
72deluxeover 10 years ago
The dead code comment at the end was informative. Does anyone else use code analysis of C&#x2F;C++ to find dead stores etc.?<p>I have used flawfinder, cppcheck and Xcode (clang&#x27;s) analysis which has helped me find issues.
TheCraiggersover 10 years ago
&gt; <i>After some hard word, however, we managed to produce a fully working exploit which we’ll describe.</i><p>Wait, now I&#x27;m confused... was it a single bit, or an entire word that triggers this bug? ;)
zarothover 10 years ago
I&#x27;m sorry, wait... they hacked it through the scroll-bars? You can&#x27;t make this shit up.
thclarkover 10 years ago
Remove those unnecessary lines of code and you will be surprised how the security holes close by themselves.